Professional Documents
Culture Documents
CompTIA Certkiller N10-006 v2015-03-28 by Veronica 124q PDF
CompTIA Certkiller N10-006 v2015-03-28 by Veronica 124q PDF
124 Questions
Number: N10-006
Passing Score: 800
Time Limit: 120 min
File Version: 5.2
http://www.gratisexam.com/
N10-006
This exam engine has many good questions. I am feeling great after passing my
exam.
It was one and only which took me towards the biggest success without finding too
much issues or worries in any way.
It guided me step by step through the course. After studying for a month using it I
achieved the highest in the whole city.
This study guides are so comprehensible that anyone can understand them and
study with their help.
This is considered to be the best resource in the field of test preparation equipment
providers. Keep up the good work!
Sections
1. Network Architecture
2. Network Operations
3. Network Security
4. Troubleshooting
5. Industry Standards, Practices, and Network Theory
6. Mixed Set
Exam A
QUESTION 1
A technician has verified that a recent loss of network connectivity to multiple workstations is due to a bad
CAT5 cable in the server room wall. Which of the following tools can be used to locate its physical location
within the wall?
A. Cable certifier
B. Multimeter
C. Cable tester
D. Toner probe
Correct Answer: D
Section: Network Architecture
Explanation
Explanation/Reference:
Explanation:
QUESTION 2
Which of the following is used to authenticate remote workers who connect from offsite? (Select TWO).
A. OSPF
B. VTP trunking
C. Virtual PBX
D. RADIUS
E. 802.1x
Correct Answer: DE
Section: Network Architecture
Explanation
Explanation/Reference:
reliable asnwer.
QUESTION 3
Which of the following describes an IPv6 address of ::1?
A. Broadcast
B. Loopback
C. Classless
D. Multicast
Correct Answer: B
Section: Network Architecture
Explanation
Explanation/Reference:
Explanation:
QUESTION 4
A SQL server needs several terabytes of disk space available to do an uncompressed backup of a
database. Which of the following devices would be the MOST cost efficient to use for this backup?
http://www.gratisexam.com/
A. iSCSI SAN
B. FCoE SAN
C. NAS
D. USB flash drive
Correct Answer: C
Section: Network Architecture
Explanation
Explanation/Reference:
Explanation:
QUESTION 5
A technician needs to set aside addresses in a DHCP pool so that certain servers always receive the same
address. Which of the following should be configured?
A. Leases
B. Helper addresses
C. Scopes
D. Reservations
Correct Answer: D
Section: Network Architecture
Explanation
Explanation/Reference:
Explanation:
QUESTION 6
A network technician receives the following alert from a network device:
Correct Answer: E
Section: Network Operations
Explanation
Explanation/Reference:
sophisticated answer.
QUESTION 7
A technician is configuring a managed switch and needs to enable 802.3af. Which of the following should
the technician enable?
A. PoE
B. Port bonding
C. VLAN
D. Trunking
Correct Answer: A
Section: Network Operations
Explanation
Explanation/Reference:
Explanation:
QUESTION 8
After a recent breach, the security technician decides the company needs to analyze and aggregate its
security logs. Which of the following systems should be used?
A. Event log
B. Syslog
C. SIEM
D. SNMP
Correct Answer: C
Section: Network Operations
Explanation
Explanation/Reference:
actual answer.
QUESTION 9
A network technician is diligent about maintaining all system servers' at the most current service pack level
available. After performing upgrades, users experience issues with server-based applications. Which of the
following should be used to prevent issues in the future?
Correct Answer: D
Section: Network Operations
Explanation
Explanation/Reference:
reliable answer.
QUESTION 10
A company has implemented the capability to send all log files to a central location by utilizing an encrypted
channel. The log files are sent to this location in order to be reviewed. A recent exploit has caused the
company's encryption to become unsecure. Which of the following would be required to resolve the exploit?
Correct Answer: B
Section: Network Operations
Explanation
Explanation/Reference:
Explanation:
QUESTION 11
The RAID controller on a server failed and was replaced with a different brand. Which of the following will
be needed after the server has been rebuilt and joined to the domain?
A. Vendor documentation
B. Recent backups
C. Physical IP address
D. Physical network diagram
Correct Answer: B
Section: Network Operations
Explanation
Explanation/Reference:
Explanation:
QUESTION 12
A network technician has been tasked with designing a WLAN for a small office. One of the requirements of
this design is that it is capable of supporting HD video streaming to multiple devices. Which of the following
would be the appropriate wireless technology for this design?
A. 802.11g
B. 802.11ac
C. 802.11b
D. 802.11a
Correct Answer: B
Section: Network Operations
Explanation
Explanation/Reference:
Explanation:
QUESTION 13
A company is experiencing accessibility issues reaching services on a cloud-based system. Which of the
following monitoring tools should be used to locate possible outages?
A. Network analyzer
B. Packet analyzer
C. Protocol analyzer
D. Network sniffer
Correct Answer: A
Section: Network Operations
Explanation
Explanation/Reference:
Okay.
QUESTION 14
It has been determined by network operations that there is a severe bottleneck on the company's mesh
topology network. The field technician has chosen to use log management and found that one router is
making routing decisions slower than others on the network. This is an example of which of the following?
Correct Answer: B
Section: Network Operations
Explanation
Explanation/Reference:
Explanation:
QUESTION 15
After a company rolls out software updates, Ann, a lab researcher, is no longer able to use lab equipment
connected to her PC. The technician contacts the vendor and determines there is an incompatibility with the
latest IO drivers. Which of the following should the technician perform so that Ann can get back to work as
quickly as possible?
Correct Answer: E
Section: Network Operations
Explanation
Explanation/Reference:
Explanation:
QUESTION 16
An administrator reassigns a laptop to a different user in the company. Upon delivering the laptop to the
new user, the administrator documents the new location, the user of the device and when the device was
reassigned. Which of the following BEST describes these actions?
A. Network map
B. Asset management
C. Change management
D. Baselines
Correct Answer: B
Section: Network Operations
Explanation
Explanation/Reference:
best suitable answer.
QUESTION 17
A network technician has been tasked to configure a new network monitoring tool that will examine
interface settings throughout various network devices. Which of the following would need to be configured
on each network device to provide that information in a secure manner?
A. S/MIME
B. SYSLOG
C. PGP
D. SNMPv3
E. RSH
Correct Answer: D
Section: Network Operations
Explanation
Explanation/Reference:
accurate answer.
QUESTION 18
Which of the following would be the result of a user physically unplugging a VoIP phone and connecting it
into another interface with switch port security enabled as the default setting?
http://www.gratisexam.com/
A. The VoIP phone would request a new phone number from the unified communications server.
B. The VoIP phone would cause the switch interface, that the user plugged into, to shutdown.
C. The VoIP phone would be able to receive incoming calls but will not be able to make outgoing calls.
D. The VoIP phone would request a different configuration from the unified communications server.
Correct Answer: B
Section: Network Operations
Explanation
Explanation/Reference:
Explanation:
QUESTION 19
A company is deploying a new wireless network and requires 800Mbps network throughput. Which of the
following is the MINIMUM configuration that would meet this need?
Correct Answer: A
Section: Network Operations
Explanation
Explanation/Reference:
Explanation:
QUESTION 20
A technician would like to track the improvement of the network infrastructure after upgrades. Which of the
following should the technician implement to have an accurate comparison?
A. Regression test
B. Speed test
C. Baseline
D. Statement of work
Correct Answer: C
Section: Network Operations
Explanation
Explanation/Reference:
Explanation:
QUESTION 21
When two or more links need to pass traffic as if they were one physical link, which of the following would
be used to satisfy the requirement?
A. Port mirroring
B. 802.1w
C. LACP
D. VTP
Correct Answer: C
Section: Network Operations
Explanation
Explanation/Reference:
truthfull.
QUESTION 22
A VLAN with a gateway offers no security without the addition of:
A. An ACL.
B. 802.1w.
C. A RADIUS server.
D. 802.1d.
Correct Answer: A
Section: Network Operations
Explanation
Explanation/Reference:
Explanation:
QUESTION 23
Network segmentation provides which of the following benefits?
Correct Answer: A
Section: Network Operations
Explanation
Explanation/Reference:
reliable answer.
QUESTION 24
A network technician must create a wireless link between two buildings in an office park utilizing the
802.11ac standard. The antenna chosen must have a small physical footprint and minimal weight as it will
be mounted on the outside of the building. Which of the following antenna types is BEST suited for this
solution?
A. Yagi
B. Omni-directional
C. Parabolic
D. Patch
Correct Answer: A
Section: Network Operations
Explanation
Explanation/Reference:
Explanation:
QUESTION 25
The administrator's network has OSPF for the internal routing protocol. One port going out to the Internet is
congested. The data is going out to the Internet, but queues up before sending. Which of the following
would resolve this issue?
Output:
Fast Ethernet 0 is up, line protocol is up
Int ip address is 10.20.130.5/25
MTU 1500 bytes, BW10000 kbit, DLY 100 usec
Reliability 255/255, Tx load 1/255, Rx load 1/255
Encapsulation ospf, loopback not set
Keep alive 10
Half duplex, 100Mb/s, 100 Base Tx/Fx
Received 1052993 broadcasts
0 input errors
983881 packets output, 768588 bytes
0 output errors, 0 collisions, 0 resets
Correct Answer: D
Section: Network Operations
Explanation
Explanation/Reference:
Explanation:
QUESTION 26
An outside organization has completed a penetration test for a company. One of the items on the report is
reflecting the ability to read SSL traffic from the web server. Which of the following is the MOST likely
mitigation for this reported item?
Correct Answer: A
Section: Network Operations
Explanation
Explanation/Reference:
Explanation:
QUESTION 27
A system administrator wants to update a web-based application to the latest version. Which of the
following procedures should the system administrator perform FIRST?
Explanation/Reference:
given answer is correct.
QUESTION 28
A technician needs to install software onto company laptops to protect local running services, from external
threats. Which of the following should the technician install and configure on the laptops if the threat is
network based?
Correct Answer: C
Section: Network Security
Explanation
Explanation/Reference:
Explanation:
QUESTION 29
Which of the following physical security controls prevents an attacker from gaining access to a network
closet?
A. CCTVs
B. Proximity readers
C. Motion sensors
D. IP cameras
Correct Answer: B
Section: Network Security
Explanation
Explanation/Reference:
Explanation:
QUESTION 30
A network technician is performing a wireless survey in the office and discovers a device that was not
installed by the networking team. This is an example of which of following threats?
A. Bluesnarfing
B. DDoS
C. Brute force
D. Rogue AP
Correct Answer: D
Section: Network Security
Explanation
Explanation/Reference:
appropriate asnwer.
QUESTION 31
A technician is setting up a computer lab. Computers on the same subnet need to communicate with each
other using peer to peer communication. Which of the following would the technician MOST likely
configure?
A. Hardware firewall
B. Proxy server
C. Software firewall
D. GRE tunneling
Correct Answer: C
Section: Network Security
Explanation
Explanation/Reference:
Explanation:
QUESTION 32
A technician needs to ensure that new systems are protected from electronic snooping of Radio Frequency
emanations. Which of the following standards should be consulted?
A. DWDM
B. MIMO
C. TEMPEST
D. DOCSIS
Correct Answer: C
Section: Network Security
Explanation
Explanation/Reference:
valid answer.
QUESTION 33
Which of the following types of network would be set up in an office so that customers could access the
Internet but not be given access to internal resources such as printers and servers?
A. Quarantine network
B. Core network
C. Guest network
D. Wireless network
Correct Answer: C
Section: Network Security
Explanation
Explanation/Reference:
Explanation:
QUESTION 34
An attacker has connected to an unused VoIP phone port to gain unauthorized access to a network. This is
an example of which of the following attacks?
A. Smurf attack
B. VLAN hopping
C. Bluesnarfing
D. Spear phishing
Correct Answer: B
Section: Network Security
Explanation
Explanation/Reference:
Explanation:
QUESTION 35
A company has decided to update their usage policy to allow employees to surf the web unrestricted from
their work computers. Which of the following actions should the IT security team implement to help protect
the network from attack as a result of this new policy?
Correct Answer: A
Section: Network Security
Explanation
Explanation/Reference:
Explanation:
QUESTION 36
An organization notices a large amount of malware and virus incidents at one satellite office, but hardly any
at another. All users at both sites are running the same company image and receive the same group
policies. Which of the following has MOST likely been implemented at the site with the fewest security
issues?
A. Consent to monitoring
B. Business continuity measures
C. Vulnerability scanning
D. End-user awareness training
Correct Answer: D
Section: Network Security
Explanation
Explanation/Reference:
Explanation:
QUESTION 37
A wireless network technician for a local retail store is installing encrypted access points within the store for
real-time inventory verification, as well as remote price checking capabilities, while employees are away
from the registers. The store is in a fully occupied strip mall that has multiple neighbors allowing guest
access to the wireless networks. There are a finite known number of approved handheld devices needing to
access the store's wireless network. Which of the following is the BEST security method to implement on
the access points?
A. Port forwarding
B. MAC filtering
C. TLS/TTLS
D. IP ACL
Correct Answer: B
Section: Network Security
Explanation
Explanation/Reference:
Explanation:
QUESTION 38
Ann, a network technician, was asked to remove a virus. Issues were found several levels deep within the
directory structure. To ensure the virus has not infected the .mp4 files in the directory, she views one of the
files and believes it contains illegal material. Which of the following forensics actions should Ann perform?
Correct Answer: B
Section: Network Security
Explanation
Explanation/Reference:
fine answer.
QUESTION 39
Which of the following describes a smurf attack?
Correct Answer: A
Section: Network Security
Explanation
Explanation/Reference:
well answered.
QUESTION 40
Which of the following technologies is designed to keep systems uptime running in the event of a disaster?
A. High availability
B. Load balancing
C. Quality of service
D. Caching engines
Correct Answer: A
Section: Network Security
Explanation
Explanation/Reference:
Explanation:
QUESTION 41
Packet analysis reveals multiple GET and POST requests from an internal host to a URL without any
response from the server. Which of the following is the BEST explanation that describes this scenario?
A. Compromised system
B. Smurf attack
C. SQL injection attack
D. Man-in-the-middle
Correct Answer: A
Section: Network Security
Explanation
Explanation/Reference:
Explanation:
QUESTION 42
Before logging into the company network, users are required to sign a document that is to be stored in their
personnel file. This standards and policies document is usually called which of the following?
A. SOP
B. BEP
C. AUP
D. SLA
Correct Answer: C
Section: Network Security
Explanation
Explanation/Reference:
nicely answered.
QUESTION 43
A network technician has set up an FTP server for the company to distribute software updates for their
products. Each vendor is provided with a unique username and password for security. Several vendors
have discovered a virus in one of the security updates. The company tested all files before uploading them
but retested the file and found the virus. Which of the following could the technician do for vendors to
validate the proper security patch?
Correct Answer: C
Section: Network Security
Explanation
Explanation/Reference:
Explanation:
QUESTION 44
A technician wants to securely manage several remote network devices. Which of the following should be
implemented to securely manage the devices?
http://www.gratisexam.com/
A. WPA2
B. IPv6
C. SNMPv3
D. RIPv2
Correct Answer: C
Section: Network Security
Explanation
Explanation/Reference:
QUESTION 45
A network technician has detected duplicate IP addresses on the network. After testing the behavior of
rogue DHCP servers, the technician believes that the issue is related to an unauthorized home router.
Which of the following should the technician do NEXT in the troubleshooting methodology?
Correct Answer: B
Section: Troubleshooting
Explanation
Explanation/Reference:
best answer.
QUESTION 46
Two weeks after installation, a network technician is now unable to log onto any of the newly installed
company switches. The technician suspects that a malicious user may have changed the switches' settings
before they were installed in secure areas. Which of the following is the MOST likely way in which the
malicious user gained access to the switches?
Correct Answer: B
Section: Troubleshooting
Explanation
Explanation/Reference:
Explanation:
QUESTION 47
When a client calls and describes a problem with a computer not being able to reach the Internet, in which
of the following places of the OSI model would a technician begin troubleshooting?
A. Transport layer
B. Physical layer
C. Network layer
D. Session layer
Correct Answer: B
Section: Troubleshooting
Explanation
Explanation/Reference:
right answer.
QUESTION 48
A network technician has been assigned to install an additional router on a wireless network. The router has
a different SSID and frequency. All users on the new access point and the main network can ping each
other and utilize the network printer, but all users on the new router cannot get to the Internet. Which of the
following is the MOST likely cause of this issue?
Correct Answer: A
Section: Troubleshooting
Explanation
Explanation/Reference:
Explanation:
QUESTION 49
A technician is troubleshooting a wired device on the network. The technician notices that the link light on
the NIC does not illuminate. After testing the device on a different RJ-45 port, the device connects
successfully. Which of the following is causing this issue?
A. EMI
B. RFI
C. Cross-talk
D. Bad wiring
Correct Answer: D
Section: Troubleshooting
Explanation
Explanation/Reference:
actual answer.
QUESTION 50
An organization requires a second technician to verify changes before applying them to network devices.
When checking the configuration of a network device, a technician determines that a coworker has
improperly configured the AS number on the device. This would result in which of the following?
Correct Answer: D
Section: Troubleshooting
Explanation
Explanation/Reference:
Explanation:
QUESTION 51
A company has had several virus infections over the past few months. The infections were caused by
vulnerabilities in the application versions that are being used. Which of the following should an administrator
implement to prevent future outbreaks?
Correct Answer: D
Section: Troubleshooting
Explanation
Explanation/Reference:
updated answer.
QUESTION 52
A user calls the help desk and states that he was working on a spreadsheet and was unable to print it.
However, his colleagues are able to print their documents to the same shared printer. Which of the
following should be the FIRST question the helpdesk asks?
Correct Answer: C
Section: Troubleshooting
Explanation
Explanation/Reference:
Explanation:
QUESTION 53
A network technician is using a network monitoring system and notices that every device on a particular
segment has lost connectivity. Which of the following should the network technician do NEXT?
Correct Answer: D
Section: Troubleshooting
Explanation
Explanation/Reference:
accurate answer.
QUESTION 54
A technician just completed a new external website and setup access rules in the firewall. After some
testing, only users outside the internal network can reach the site. The website responds to a ping from the
internal network and resolves the proper public address. Which of the following could the technician do to
fix this issue while causing internal users to route to the website using an internal address?
Correct Answer: B
Section: Troubleshooting
Explanation
Explanation/Reference:
appropriate answer.
QUESTION 55
A network administrator recently installed a web proxy server at a customer's site. The following week, a
system administrator replaced the DNS server overnight. The next day, customers began having issues
accessing public websites. Which of the following will resolve the issue?
Correct Answer: A
Section: Troubleshooting
Explanation
Explanation/Reference:
Explanation:
QUESTION 56
While troubleshooting a connectivity issue, a network technician determines the IP address of a number of
workstations is 169.254.0.0/16 and the workstations cannot access the Internet. Which of the following
should the technician check to resolve the problem?
Correct Answer: C
Section: Troubleshooting
Explanation
Explanation/Reference:
Explanation:
QUESTION 57
A technician recently ran a 20-meter section of CAT6 to relocate a control station to a more central area on
the production floor. Since the relocation, the helpdesk has received complaints about intermittent
operation. During the troubleshooting process, the technician noticed that collisions are only observed on
the switch port during production. Given this information, which of the following is the cause of the problem?
A. Distance limitation
B. Electromagnetic interference
C. Cross talk
D. Speed and duplex mismatch
Correct Answer: B
Section: Troubleshooting
Explanation
Explanation/Reference:
good choice of answer.
QUESTION 58
A technician has finished configuring AAA on a new network device. However, the technician is unable to
log into the device with LDAP credentials but is able to do so with a local user account. Which of the
following is the MOST likely reason for the problem?
Correct Answer: C
Section: Troubleshooting
Explanation
Explanation/Reference:
Explanation:
QUESTION 59
A technician is tasked with connecting a router to a DWDM. The technician connects the router to the
multiplexer and confirms that there is a good signal level. However, the interface on the router will not come
up. Which of the following is the MOST likely cause?
Correct Answer: A
Section: Troubleshooting
Explanation
Explanation/Reference:
actual answer.
QUESTION 60
Which of the following is the main difference between TCP and UDP?
A. TCP data flows in two directions, while UDP data flows from server to client.
B. The TCP header implements flags, while the UDP header does not.
C. The TCP header implements checksum, while the UDP header does not.
D. TCP connections can be secured by stateful firewalls, while UDP connections cannot.
Correct Answer: B
Section: Industry Standards, Practices, and Network Theory
Explanation
Explanation/Reference:
Explanation:
QUESTION 61
Which of the following PDUs is used by a connectionless protocol?
A. Frames
B. Segments
C. Streams
D. Datagram
Correct Answer: D
Section: Industry Standards, Practices, and Network Theory
Explanation
Explanation/Reference:
Explanation:
QUESTION 62
When troubleshooting a network problem, browsing through the log of a switch, it is discovered that multiple
frames contain errors. In which of the following layers does the problem reside? (Select TWO).
A. Layer 2
B. Layer 3
C. Layer 5
D. Transport layer
E. Data link
F. Physical layer
Correct Answer: AE
Section: Industry Standards, Practices, and Network Theory
Explanation
Explanation/Reference:
answer is to the point.
QUESTION 63
A network technician is attempting to locate a switch connected to the fourth floor west side of the building.
Which of the following will allow quick identification of the switch, when looking at a logical diagram?
A. Building layout
B. Patch panel labeling
C. Packet sniffing
D. Naming conventions
Correct Answer: D
Section: Industry Standards, Practices, and Network Theory
Explanation
Explanation/Reference:
Explanation:
QUESTION 64
In an engineering office, all plotters are configured via static IP. Which of the following best practices will
alleviate many issues if equipment moves are required? (Select TWO).
A. Rack monitoring
B. Device placement
C. Wall plate labeling
D. Room numbering
E. Patch panel labeling
Correct Answer: CE
Section: Industry Standards, Practices, and Network Theory
Explanation
Explanation/Reference:
properly sorted answer.
QUESTION 65
Which of the following devices implements CSMA/CA virtually through the RTS/CTS protocols?
A. Firewall
B. Router
C. 802.11 AP
D. Switch
Correct Answer: C
Section: Industry Standards, Practices, and Network Theory
Explanation
Explanation/Reference:
Explanation:
QUESTION 66
A user with a 802.11n WLAN card is connected to a SOHO network and is only able to connect at 11 Mbps
with full signal strength. Which of the following standards is implemented on the network?
A. 802.11a
B. 802.11ac
C. 802.11b
D. 802.11g
Correct Answer: C
Section: Industry Standards, Practices, and Network Theory
Explanation
Explanation/Reference:
Explanation:
QUESTION 67
A customer has engaged a company to improve the availability of all of the customer's services and
applications, enabling the customer to minimize downtime to a few hours per quarter. Which of the following
will document the scope of the activities the company will provide to the customer, including the intended
outcomes?
A. MLA
B. MOU
C. SOW
D. SLA
Correct Answer: C
Section: Industry Standards, Practices, and Network Theory
Explanation
Explanation/Reference:
Explanation:
QUESTION 68
A network technician has just installed a TFTP server on the administrative segment of the network to store
router and switch configurations. After a transfer attempt to the server is made, the process errors out.
Which of the following is a cause of the error?
Correct Answer: D
Section: Industry Standards, Practices, and Network Theory
Explanation
Explanation/Reference:
appropriate answer.
QUESTION 69
An organization is moving to a new datacenter. During the move, several technicians raise concerns about
a system that could potentially remove oxygen from the server room and result in suffocation. Which of the
following systems are they MOST likely discussing?
A. Fire suppression
B. Mantraps at the entry
C. HVAC
D. UPS and battery backups
Correct Answer: A
Section: Industry Standards, Practices, and Network Theory
Explanation
Explanation/Reference:
QUESTION 70
A technician, Joe, needs to troubleshoot a recently installed NIC. He decides to ping the local loopback
address. Which of the following is a valid IPv4 loopback address?
A. 10.0.0.1
B. 127.0.0.1
C. 172.16.1.1
D. 192.168.1.1
Correct Answer: B
Section: Mixed Set
Explanation
Explanation/Reference:
Explanation:
QUESTION 71
An F-connector is used on which of the following types of cabling?
A. CAT3
B. Single mode fiber
C. CAT5
D. RG6
Correct Answer: D
Section: Mixed Set
Explanation
Explanation/Reference:
Explanation:
QUESTION 72
After repairing a computer infected with malware, a technician determines that the web browser fails to go
to the proper address for some sites. Which of the following should be checked?
Correct Answer: C
Section: Mixed Set
Explanation
Explanation/Reference:
fine answer.
QUESTION 73
A company wants to make sure that users are required to authenticate prior to being allowed on the
network. Which of the following is the BEST way to accomplish this?
http://www.gratisexam.com/
A. 802.1x
B. 802.1p
C. Single sign-on
D. Kerberos
Correct Answer: A
Section: Mixed Set
Explanation
Explanation/Reference:
well answered.
QUESTION 74
Joe, a network technician, is setting up a DHCP server on a LAN segment. Which of the following options
should Joe configure in the DHCP scope, in order to allow hosts on that LAN segment using dynamic IP
addresses, to be able to access the Internet and internal company servers? (Select THREE).
A. Default gateway
B. Subnet mask
C. Reservations
D. TFTP server
E. Lease expiration time of 1 day
F. DNS servers
G. Bootp
Explanation/Reference:
Explanation:
QUESTION 75
Which of the following protocols uses label-switching routers and label-edge routers to forward traffic?
A. BGP
B. OSPF
C. IS-IS
D. MPLS
Correct Answer: D
Section: Mixed Set
Explanation
Explanation/Reference:
Explanation:
QUESTION 76
A user connects to a wireless network at the office and is able to access unfamiliar SMB shares and
printers. Which of the following has happened to the user?
A. The user is connected using the wrong channel.
B. The user is connected to the wrong SSID.
C. The user is experiencing an EMI issue.
D. The user is connected to the wrong RADIUS server.
Correct Answer: B
Section: Mixed Set
Explanation
Explanation/Reference:
Explanation:
QUESTION 77
A network engineer is dispatched to an employee office to troubleshoot an issue with the employee's
laptop. The employee is unable to connect to local and remote resources. The network engineer flips the
laptop's wireless switch on to resolve the issue. At which of the following layers of the OSI model was the
issue resolved?
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
E. Layer 7
Correct Answer: A
Section: Mixed Set
Explanation
Explanation/Reference:
Explanation:
QUESTION 78
A network technician has detected a personal computer that has been physically connected to the
corporate network. Which of the following commands would the network technician use to locate this
unauthorized computer and determine the interface it is connected to?
A. nbtstat a
B. show mac address-table
C. show interface status
D. show ip access-list
E. nslookup hostname
Correct Answer: B
Section: Mixed Set
Explanation
Explanation/Reference:
Explanation:
QUESTION 79
A network technician is troubleshooting a problem at a remote site. It has been determined that the
connection from router A to router B is down. The technician at the remote site re-terminates the CAT5
cable that connects the two routers as a straight through cable. The cable is then tested and is plugged into
the correct interface. Which of the following would be the result of this action?
A. The normal amount of errors and the connection problem has been resolved.
B. The interface status will indicate that the port is administratively down.
C. The traffic will flow, but with excessive errors.
D. The interface status will show line protocol down.
Correct Answer: D
Section: Mixed Set
Explanation
Explanation/Reference:
Explanation:
QUESTION 80
After connecting a workstation directly to a small business firewall, a network administrator is trying to
manage it via HTTPS without losing its stored configuration. The only two pieces of information that the
network administrator knows about the firewall are the management interface MAC address, which is
01:4a:d1:fa:b1:0e, and the administrator's password. Which of the following will allow the administrator to
log onto the firewall via HTTPS if the management's IP address is unknown and the administrator's
workstation IP address is 192.168.0.10/23?
A. Use the reset button on the back of the firewall to restore it to its factory default, and then log onto
B. Run the following command on the administrator's workstation: arp s 192.168.1.200
01:4a:d1:fa:b1:0e
C. Use an SNMP tool to query the firewall properties and determine the correct management IP address
D. Use a crossover cable to connect to the console port and reconfigure the firewall management IP to
192.168.0.1
Correct Answer: B
Section: Mixed Set
Explanation
Explanation/Reference:
Explanation:
QUESTION 81
A network technician is utilizing a network protocol analyzer to troubleshoot issues that a user has been
experiencing when uploading work to the internal FTP server. Which of the following default port numbers
should the technician set the analyzer to highlight when creating a report? (Select TWO).
A. 20
B. 21
C. 22
D. 23
E. 67
F. 68
G. 69
Correct Answer: AB
Section: Mixed Set
Explanation
Explanation/Reference:
Explanation:
QUESTION 82
A network engineer needs to set up a topology that will not fail if there is an outage on a single piece of the
topology. However, the computers need to wait to talk on the network to avoid congestions. Which of the
following topologies would the engineer implement?
A. Star
B. Bus
C. Ring
D. Mesh
Correct Answer: C
Section: Mixed Set
Explanation
Explanation/Reference:
Explanation:
QUESTION 83
A company has changed ISPs for their office and ordered a new 250 Mbps symmetrical Internet
connection. As a result, they have been given a new IP range. The ISP has assigned the company
10.10.150.16 /28. The company gateway router has the following interface configuration facing the ISP:
Interface A:
IP address: 10.10.150.16
Subnet mask: 255.255.255.240
Default gateway: 10.10.150.32
Speed: 1000 Mbps
Duplex: Auto
State: No Shutdown
None of the workstations at the company are able to access the Internet. Which of the following are the
reasons? (Select TWO).
Correct Answer: EF
Section: Mixed Set
Explanation
Explanation/Reference:
best answer.
QUESTION 84
The ability to make access decisions based on an examination of Windows registry settings, antivirus
software, and AD membership status is an example of which of the following NAC features?
A. Quarantine network
B. Persistent agents
C. Posture assessment
D. Non-persistent agents
Correct Answer: C
Section: Mixed Set
Explanation
Explanation/Reference:
Explanation:
QUESTION 85
A technician is troubleshooting a client's connection to a wireless network. The client is asked to run a
"getinfo" command to list information about the existing condition.
Given this output, which of the following has the technician learned about the wireless network? (Select
TWO).
Correct Answer: CE
Section: Mixed Set
Explanation
Explanation/Reference:
right answer.
QUESTION 86
You have been tasked with testing a CAT5e cable. A summary of the test results can be found on the
screen.
Step 1: Select the tool that was used to create the cable test results.
Step 2: Interpret the test results and select the option that explains the results. After you are done with your
analysis, click the 'Submit Cable Test Analysis' button.
Correct Answer: Solution is pending. Please suggest your solution for this simulation question to us.
Section: (none)
Explanation
Explanation/Reference:
QUESTION 87
A company wants to create highly available datacenters. Which of the following will allow the company to
continue to maintain an Internet presence at all sites in the event that a WAN circuit at one site goes down?
A. Load balancer
B. VRRP
C. OSPF
D. BGP
Correct Answer: D
Section: Network Architecture
Explanation
Explanation/Reference:
Explanation:
QUESTION 88
A network technician has received a help desk ticket indicating that after the new wireless access point was
installed, all of the media department's devices are experiencing sporadic wireless connectivity. All other
departments are connecting just fine and the settings on the new access point were copied from the
baseline. Which of the following is a reason why the media department is not connecting?
A. Wrong SSID
B. Rogue access point
C. Placement
D. Channel mismatch
Correct Answer: C
Section: Mixed Set
Explanation
Explanation/Reference:
correct answer.
QUESTION 89
Ann, a user, is experiencing an issue with her wireless device. While in the conference area, the wireless
signal is steady and strong. However, at her desk the signal is consistently dropping, yet the device
indicates a strong signal. Which of the following is the MOST likely cause of the issue?
A. Signal-to-noise ratio
B. AP configuration
C. Incorrect SSID
D. Bounce
Correct Answer: D
Section: Mixed Set
Explanation
Explanation/Reference:
finely answered.
QUESTION 90
A desktop computer is connected to the network and receives an APIPA address but is unable to reach the
VLAN gateway of 10.10.100.254. Other PCs in the VLAN subnet are able to reach the Internet. Which of
the following is MOST likely the source of the problem?
Correct Answer: A
Section: Mixed Set
Explanation
Explanation/Reference:
Explanation:
QUESTION 91
Corporate headquarters provided your office a portion of their class B subnet to use at a new office location.
Allocate the minimum number of addresses (using CIDR notation) needed to accommodate each
department.
Alter accommodating each department, identify the unused portion of the subnet by responding to the
question on the graphic. All drop downs must be filled.
Instructions: When the simulation is complete, please select the Done button to submit.
Hot Area:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
QUESTION 92
Which of the following connection types is used to terminate DS3 connections in a telecommunications
facility?
A. 66 block
B. BNC
C. F-connector
D. RJ-11
Correct Answer: B
Section: Mixed Set
Explanation
Explanation/Reference:
best asnwer.
QUESTION 93
Wireless network users recently began experiencing speed and performance issues after access point 2
(AP2) was replaced due to faulty hardware. The original network was installed according to a consultant's
specifications and has always worked without a problem.
You, a network technician, have been tasked with evaluating the situation and resolving the issues to
improve both performance and connectivity. Refer to the following diagram and perform any NECESSARY
changes to the wireless and wired infrastructure by adjusting devices.
Note: Adjust the LEAST number of devices needed to fix the issue, all blue icons in the image are clickable.
When you feel the simulation is complete please select the Done button.
Correct Answer: -Change the speed and duplex settings on AP2 only to 100 and full. -or- -Change the
mode to G on AP2 -or- -Change the channel to 6 on AP2
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Since we know that the network was running perfectly before replacing AP2 we should start by looking at
this new device that was used to replace the old one. Here we see that the other AP’s have hard coded the
speed and duplex settings to 100/full, while AP2 is set to auto/auto.
Also, the other AP’s have been configured to use 802.11G, while AP2 is using 802.11B.
Finally the channel that AP2 is using overlaps with AP1 which can cause problems. Channels 1, 6, and 11
are spaced far enough apart that they don’t overlap. On a non-MIMO setup (i.e. 802.11 a, b, or g) you
should always try to use channel 1, 6, or 11. Since AP1 is using 1, and AP3 is using 11, AP2 should be
using 6.
QUESTION 94
A network technician is performing a tracert command to troubleshoot a website-related issue. The
following output is received for each hop in the tracert:
1 * * * Request timed out.
2 * * * Request timed out.
3 * * * Request timed out.
The technician would like to see the results of the tracert command. Which of the following will allow the
technician to perform tracert on external sites but not allow outsiders to discover information from inside the
network?
A. Enable split horizon to allow internal tracert commands to pass through the firewall
B. Enable IGMP messages out and block IGMP messages into the network
C. Configure the firewall to allow echo reply in and echo request out of the network
D. Install a backdoor to access the router to allow tracert messages to pass through
Correct Answer: C
Section: Troubleshooting
Explanation
Explanation/Reference:
QUESTION 95
A network technician must utilize multimode fiber to uplink a new networking device. Which of the following
Ethernet standards could the technician utilize? (Select TWO).
A. 1000Base-LR
B. 1000Base-SR
C. 1000Base-T
D. 10GBase-LR
E. 10GBase-SR
F. 10GBase-T
Correct Answer: BE
Section: Industry Standards, Practices, and Network Theory
Explanation
Explanation/Reference:
Explanation:
QUESTION 96
A network administrator is using a packet analyzer to determine an issue on the local LAN. Two separate
computers are showing an error message on the screen and are unable to communicate with other
computers in the same lab. The network administrator looks at the following output:
Given that all the computers in the lab are directly connected to the same switch, and are not using any
virtualization technology, at which of the following layers of the OSI model is the problem occurring?
A. Network
B. Application
C. Data link
D. Transport
Correct Answer: A
Section: Industry Standards, Practices, and Network Theory
Explanation
Explanation/Reference:
Explanation:
QUESTION 97
Which of the following requires the network administrator to schedule a maintenance window?
Correct Answer: B
Section: Industry Standards, Practices, and Network Theory
Explanation
Explanation/Reference:
fine answer.
QUESTION 98
The management team wants to set up a wireless network in their office but all of their phones operate at
the 2.4 GHz frequency. They need a wireless network that would be able to operate at a higher frequency
than their phones. Which of following standards should be used?
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.1x
Correct Answer: A
Section: Industry Standards, Practices, and Network Theory
Explanation
Explanation/Reference:
Explanation:
QUESTION 99
Which of the following will negotiate standoff timers to allow multiple devices to communicate on congested
network segments?
A. CSMA/CD
B. OSPF
C. DOCSIS
D. BGP
Correct Answer: A
Section: Industry Standards, Practices, and Network Theory
Explanation
Explanation/Reference:
Explanation:
QUESTION 100
A network administrator has created a virtual machine in the cloud. The technician would like to connect to
the server remotely using RDP. Which of the following default ports needs to be opened?
A. 445
B. 3389
http://www.gratisexam.com/
C. 5004
D. 5060
Correct Answer: B
Section: Industry Standards, Practices, and Network Theory
Explanation
Explanation/Reference:
Explanation:
QUESTION 101
Which of the following does a network technician need to implement if a change is unsuccessful within the
approved maintenance window?
A. Configuration procedures
B. Stakeholder notification
C. Impact analysis
D. Rollback procedure
Correct Answer: D
Section: Industry Standards, Practices, and Network Theory
Explanation
Explanation/Reference:
correct answer.
QUESTION 102
Which of the following would be used in an IP-based video conferencing deployment? (Select TWO).
A. RS-232
B. 56k modem
C. Bluetooth
D. Codec
E. SIP
Correct Answer: DE
Section: Network Architecture
Explanation
Explanation/Reference:
genuine answer.
QUESTION 103
Which of the following communication technologies would MOST likely be used to increase bandwidth over
an existing fiber optic network by combining multiple signals at different wavelengths?
A. DWDM
B. SONET
C. ADSL
D. LACP
Correct Answer: A
Section: Network Architecture
Explanation
Explanation/Reference:
Explanation:
QUESTION 104
Which of the following WAN technologies is associated with high latency?
A. T1
B. Satellite
C. Cable
D. OCx
Correct Answer: B
Section: Network Architecture
Explanation
Explanation/Reference:
Explanation:
QUESTION 105
Which of the following is used to define how much bandwidth can be used by various protocols on the
network?
A. Traffic shaping
B. High availability
C. Load balancing
D. Fault tolerance
Correct Answer: A
Section: Network Architecture
Explanation
Explanation/Reference:
fine answer.
QUESTION 106
Which of the following network topologies has a central, single point of failure?
A. Ring
B. Star
C. Hybrid
D. Mesh
Correct Answer: B
Section: Network Architecture
Explanation
Explanation/Reference:
well answered.
QUESTION 107
A technician is helping a SOHO determine where to install the server. Which of the following should be
considered FIRST?
A. Compatibility requirements
B. Environment limitations
C. Cable length
D. Equipment limitations
Correct Answer: B
Section: Network Architecture
Explanation
Explanation/Reference:
Explanation:
QUESTION 108
A technician has been given a list of requirements for a LAN in an older building using CAT6 cabling. Which
of the following environmental conditions should be considered when deciding whether or not to use
plenum-rated cables?
A. Workstation models
B. Window placement
C. Floor composition
D. Ceiling airflow condition
Correct Answer: D
Section: Network Architecture
Explanation
Explanation/Reference:
properly answered.
QUESTION 109
A company has a new offering to provide access to their product from a central location rather than clients
internally hosting the product on the client network. The product contains sensitive corporate information
that should not be accessible from one client to another. This is an example of which of the following?
A. Public SaaS
B. Private SaaS
C. Hybrid IaaS
D. Community IaaS
Correct Answer: B
Section: Network Architecture
Explanation
Explanation/Reference:
actual answer.
QUESTION 110
Which of the following refers to a network that spans several buildings that are within walking distance of
each other?
A. CAN
B. WAN
C. PAN
D. MAN
Correct Answer: A
Section: Network Architecture
Explanation
Explanation/Reference:
best suitable answer.
QUESTION 111
Alter recent changes to the pictured network, several users are unable to access the servers. Only PC1,
PC2, PC3, and PC4 are clickable and will give you access to the command prompt and the adapter
configuration tabs.
Instructions: Verify the settings by using the command prompt, after making any system changes. Next,
restore connectivity by making the appropriate changes to the infrastructure. When you have completed
these steps, select the Done button to submit.
Correct Answer: On PC3, change the subnet mask to 255.255.255.0. When it is set to 255.255.255.128,
then the PC with a .129 address will not be on the same subnet as the default gateway which is .1 On PC4,
change the default gateway to 10.0.2.1. It has been incorrectly set as 10.1.2.1.
Section: (none)
Explanation
Explanation/Reference:
QUESTION 112
Which of the following helps prevent routing loops?
A. Routing table
B. Default gateway
C. Route summarization
D. Split horizon
Correct Answer: D
Section: Network Architecture
Explanation
Explanation/Reference:
Explanation:
QUESTION 113
Which of the following is MOST likely to use an RJ-11 connector to connect a computer to an ISP using a
POTS line?
A. Multilayer switch
B. Access point
C. Analog modem
D. DOCSIS modem
Correct Answer: C
Section: Network Architecture
Explanation
Explanation/Reference:
accurately answered.
QUESTION 114
An administrator has a virtualization environment that includes a vSAN and iSCSI switching. Which of the
following actions could the administrator take to improve the performance of data transfers over iSCSI
switches?
A. The administrator should configure the switch ports to auto-negotiate the proper Ethernet settings.
B. The administrator should configure each vSAN participant to have its own VLAN.
C. The administrator should connect the iSCSI switches to each other over inter-switch links (ISL).
D. The administrator should set the MTU to 9000 on the each of the participants in the vSAN.
Correct Answer: D
Section: Network Architecture
Explanation
Explanation/Reference:
Explanation:
QUESTION 115
A network topology that utilizes a central device with point-to-point connections to all other devices is which
of the following?
A. Star
B. Ring
C. Mesh
D. Bus
Correct Answer: A
Section: Network Architecture
Explanation
Explanation/Reference:
appropriate asnwer.
QUESTION 116
A technician is connecting a NAS device to an Ethernet network. Which of the following technologies will be
used to encapsulate the frames?
A. HTTPS
B. Fibre channel
C. iSCSI
D. MS-CHAP
Correct Answer: C
Section: Network Architecture
Explanation
Explanation/Reference:
Explanation:
QUESTION 117
The network install is failing redundancy testing at the MDF. The traffic being transported is a mixture of
multicast and unicast signals. Which of the following would BEST handle the rerouting caused by the
disruption of service?
A. Layer 3 switch
B. Proxy server
C. Layer 2 switch
D. Smart hub
Correct Answer: A
Section: Network Architecture
Explanation
Explanation/Reference:
definite answer.
QUESTION 118
A network technician was tasked to respond to a compromised workstation. The technician documented
the scene, took the machine offline, and left the PC under a cubicle overnight. Which of the following steps
of incident handling has been incorrectly performed?
Correct Answer: D
Section: Network Security
Explanation
Explanation/Reference:
Explanation:
QUESTION 119
During a check of the security control measures of the company network assets, a network administrator is
explaining the difference between the security controls at the company. Which of the following would be
identified as physical security controls? (Select THREE).
A. RSA
B. Passwords
C. Man traps
D. Biometrics
E. Cipher locks
F. VLANs
G. 3DES
Correct Answer: CDE
Section: Network Security
Explanation
Explanation/Reference:
properly sorted answer.
QUESTION 120
A technician is installing a surveillance system for a home network. The technician is unsure which ports
need to be opened to allow remote access to the system. Which of the following should the technician
perform?
Correct Answer: D
Section: Network Security
Explanation
Explanation/Reference:
Explanation:
QUESTION 121
A firewall ACL is configured as follows:
A technician notices that users in the 10.200.0.0/16 network are unable to SSH into servers in the DMZ.
The company wants 10.200.0.0/16 to be able to use any protocol, but restrict the rest of the 10.0.0.0/8
subnet to web browsing only. Reordering the ACL in which of the following manners would meet the
company's objectives?
Correct Answer: A
Section: Network Security
Explanation
Explanation/Reference:
Explanation:
QUESTION 122
A malicious user floods a switch with frames hoping to redirect traffic to the user's server. Which of the
following attacks is the user MOST likely using?
A. DNS poisoning
B. ARP poisoning
C. Reflection
D. SYN attack
Correct Answer: B
Section: Network Security
Explanation
Explanation/Reference:
Explanation:
QUESTION 123
Which of the following is a security benefit gained from setting up a guest wireless network?
Correct Answer: B
Section: Network Security
Explanation
Explanation/Reference:
Explanation:
QUESTION 124
A company has seen an increase in ransomware across the enterprise. Which of the following should be
implemented to reduce the occurrences?
A. ARP inspection
B. Intrusion detection system
C. Web content filtering
D. Port filtering
Correct Answer: C
Section: Network Security
Explanation
Explanation/Reference:
well answered.
http://www.gratisexam.com/